Security management Definitions

  • C

    chief trust officer

    A chief trust officer in the IT industry is an executive job title given to the person responsible for building confidence around the use of customer information and how it is protected.

  • D

    distributed ledger technology (DLT)

    Distributed ledger technology (DLT) is a digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time.

  • F

    field-level encryption

    Field-level encryption is the ability to encrypt data based on entire fields.

  • H

    Honey Encryption

    Honey Encryption is a security tool that makes it difficult for an attacker who is carrying out a brute force attack to know if he has correctly guessed a password or encryption key.

  • S

    Sarbanes-Oxley Act (SOX)

    The Sarbanes-Oxley Act of 2002 (often shortened to SOX) is legislation passed by the U.S. Congress to protect shareholders and the general public from accounting errors and fraudulent practices in the enterprise, as well as improve the accuracy of corporate disclosures.

  • T

    threat hunter (cybersecurity threat analyst)

    A threat hunter, also called a cybersecurity threat analyst, is a security professional or security professional service provider that proactively uses manual or machine-assisted techniques to detect security incidents that may elude the grasp of automated systems.

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close